Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Oct 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Enalean
Enalean tuleap |
|
CPEs | cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:* cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:* |
|
Vendors & Products |
Enalean
Enalean tuleap |
Tue, 15 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 14 Oct 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue. | |
Title | Tuleap vulnerable to XSS in the HTML mail content of the cross reference field | |
Weaknesses | CWE-79 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-10-15T15:41:02.095Z
Reserved: 2024-09-16T16:10:09.018Z
Link: CVE-2024-46980

Updated: 2024-10-15T15:40:58.100Z

Status : Analyzed
Published: 2024-10-14T18:15:03.947
Modified: 2024-10-16T14:05:27.090
Link: CVE-2024-46980

No data.